Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Download
Faster access than browser!
 

Rainbow table

Index Rainbow table

A rainbow table is a precomputed table for reversing cryptographic hash functions, usually for cracking password hashes. [1]

37 relations: A5/1, Authentication, Berkeley Software Distribution, Big O notation, Brute-force attack, Concatenation, Crypt (C), Cryptographic hash function, Dictionary attack, Hash chain, IEEE Transactions on Information Theory, Key derivation function, Key stretching, LAN Manager, Lecture Notes in Computer Science, Linux, Lookup table, Martin Hellman, MD4, MD5, Microsoft, Microsoft Windows, NT LAN Manager, Ophcrack, Password, Password cracking, Plaintext, Pollard's kangaroo algorithm, Precomputation, RainbowCrack, Salt (cryptography), Santa Barbara, California, SHA-1, Solaris (operating system), Space–time tradeoff, Unix, USENIX.

A5/1

A5/1 is a stream cipher used to provide over-the-air communication privacy in the GSM cellular telephone standard.

New!!: Rainbow table and A5/1 · See more »

Authentication

Authentication (from authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an attribute of a single piece of data claimed true by an entity.

New!!: Rainbow table and Authentication · See more »

Berkeley Software Distribution

Berkeley Software Distribution (BSD) was a Unix operating system derivative developed and distributed by the Computer Systems Research Group (CSRG) of the University of California, Berkeley, from 1977 to 1995.

New!!: Rainbow table and Berkeley Software Distribution · See more »

Big O notation

Big O notation is a mathematical notation that describes the limiting behaviour of a function when the argument tends towards a particular value or infinity.

New!!: Rainbow table and Big O notation · See more »

Brute-force attack

In cryptography, a brute-force attack consists of an attacker trying many passwords or passphrases with the hope of eventually guessing correctly.

New!!: Rainbow table and Brute-force attack · See more »

Concatenation

In formal language theory and computer programming, string concatenation is the operation of joining character strings end-to-end.

New!!: Rainbow table and Concatenation · See more »

Crypt (C)

crypt is the library function which is used to compute a password hash that can be used to store user account passwords while keeping them relatively secure (a passwd file).

New!!: Rainbow table and Crypt (C) · See more »

Cryptographic hash function

A cryptographic hash function is a special class of hash function that has certain properties which make it suitable for use in cryptography.

New!!: Rainbow table and Cryptographic hash function · See more »

Dictionary attack

In cryptanalysis and computer security, a dictionary attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by trying hundreds or sometimes millions of likely possibilities, such as words in a dictionary.

New!!: Rainbow table and Dictionary attack · See more »

Hash chain

A hash chain is the successive application of a cryptographic hash function to a piece of data.

New!!: Rainbow table and Hash chain · See more »

IEEE Transactions on Information Theory

IEEE Transactions on Information Theory is a monthly peer-reviewed scientific journal published by the IEEE Information Theory Society.

New!!: Rainbow table and IEEE Transactions on Information Theory · See more »

Key derivation function

In cryptography, a key derivation function (KDF) derives one or more secret keys from a secret value such as a master key, a password, or a passphrase using a pseudorandom function.

New!!: Rainbow table and Key derivation function · See more »

Key stretching

In cryptography, key stretching techniques are used to make a possibly weak key, typically a password or passphrase, more secure against a brute-force attack by increasing the time it takes to test each possible key.

New!!: Rainbow table and Key stretching · See more »

LAN Manager

LAN Manager was a Network operating system (NOS) available from multiple vendors and developed by Microsoft in cooperation with 3Com Corporation.

New!!: Rainbow table and LAN Manager · See more »

Lecture Notes in Computer Science

Springer Lecture Notes in Computer Science (LNCS) is a series of computer science books published by Springer Science+Business Media (formerly Springer-Verlag) since 1973.

New!!: Rainbow table and Lecture Notes in Computer Science · See more »

Linux

Linux is a family of free and open-source software operating systems built around the Linux kernel.

New!!: Rainbow table and Linux · See more »

Lookup table

In computer science, a lookup table is an array that replaces runtime computation with a simpler array indexing operation.

New!!: Rainbow table and Lookup table · See more »

Martin Hellman

Martin Edward Hellman (born October 2, 1945) is an American cryptologist, best known for his invention of public key cryptography in cooperation with Whitfield Diffie and Ralph Merkle.

New!!: Rainbow table and Martin Hellman · See more »

MD4

The MD4 Message-Digest Algorithm is a cryptographic hash function developed by Ronald Rivest in 1990.

New!!: Rainbow table and MD4 · See more »

MD5

The MD5 algorithm is a widely used hash function producing a 128-bit hash value.

New!!: Rainbow table and MD5 · See more »

Microsoft

Microsoft Corporation (abbreviated as MS) is an American multinational technology company with headquarters in Redmond, Washington.

New!!: Rainbow table and Microsoft · See more »

Microsoft Windows

Microsoft Windows is a group of several graphical operating system families, all of which are developed, marketed, and sold by Microsoft.

New!!: Rainbow table and Microsoft Windows · See more »

NT LAN Manager

In a Windows network, NT LAN Manager (NTLM) is a suite of Microsoft security protocols that provides authentication, integrity, and confidentiality to users.

New!!: Rainbow table and NT LAN Manager · See more »

Ophcrack

Ophcrack is a free open source (GPL licensed) program that cracks Windows log-in passwords by using LM hashes through rainbow tables.

New!!: Rainbow table and Ophcrack · See more »

Password

A password is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource (example: an access code is a type of password), which is to be kept secret from those not allowed access.

New!!: Rainbow table and Password · See more »

Password cracking

In cryptanalysis and computer security, password cracking is the process of recovering passwords from data that have been stored in or transmitted by a computer system.

New!!: Rainbow table and Password cracking · See more »

Plaintext

In cryptography, plaintext or cleartext is unencrypted information, as opposed to information encrypted for storage or transmission.

New!!: Rainbow table and Plaintext · See more »

Pollard's kangaroo algorithm

In computational number theory and computational algebra, Pollard's kangaroo algorithm (also Pollard's lambda algorithm, see Naming below) is an algorithm for solving the discrete logarithm problem.

New!!: Rainbow table and Pollard's kangaroo algorithm · See more »

Precomputation

In algorithms, precomputation is the act of performing an initial computation before run time to generate a lookup table that can be used by an algorithm to avoid repeated computation each time it is executed.

New!!: Rainbow table and Precomputation · See more »

RainbowCrack

RainbowCrack is a computer program which generates rainbow tables to be used in password cracking.

New!!: Rainbow table and RainbowCrack · See more »

Salt (cryptography)

In cryptography, a salt is random data that is used as an additional input to a one-way function that "hashes" data, a password or passphrase.

New!!: Rainbow table and Salt (cryptography) · See more »

Santa Barbara, California

Santa Barbara (Spanish for "Saint Barbara") is the county seat of Santa Barbara County in the U.S. state of California.

New!!: Rainbow table and Santa Barbara, California · See more »

SHA-1

In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function which takes an input and produces a 160-bit (20-byte) hash value known as a message digest - typically rendered as a hexadecimal number, 40 digits long.

New!!: Rainbow table and SHA-1 · See more »

Solaris (operating system)

Solaris is a Unix operating system originally developed by Sun Microsystems.

New!!: Rainbow table and Solaris (operating system) · See more »

Space–time tradeoff

A space–time or time–memory trade-off in computer science is a case where an algorithm or program trades increased space usage with decreased time.

New!!: Rainbow table and Space–time tradeoff · See more »

Unix

Unix (trademarked as UNIX) is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, development starting in the 1970s at the Bell Labs research center by Ken Thompson, Dennis Ritchie, and others.

New!!: Rainbow table and Unix · See more »

USENIX

The USENIX Association is the Advanced Computing Systems Association.

New!!: Rainbow table and USENIX · See more »

Redirects here:

Rainbow Table, Rainbow attack, Rainbow tables, Reduction function, Thunder table.

References

[1] https://en.wikipedia.org/wiki/Rainbow_table

OutgoingIncoming
Hey! We are on Facebook now! »